![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
1,116 Result(s)
-
Chapter and Conference Paper
Occluded objects recognition using multiscale features and Hopfield neural networks
A new method to recognize partially visible two-dimensional objects by means of multiscale features and Hopfield neural network is proposed. The Hopfield network is employed to perform global feature matching....
-
Chapter and Conference Paper
Texture feature coding method for classification of liver sonography
Liver sonography is a widely used noninvasive diagnostic tool. Analyzing histology changes in sonograms provides a means of diagnosing and monitoring chronic liver diseases. Nonetheless, conventional ultrasono...
-
Chapter and Conference Paper
Effective representation of aliases and indirect memory operations in SSA form
This paper addresses the problems of representing aliases and indirect memory operations in SSA form. We propose a method that prevents explosion in the number of SSA variable versions in the presence of alias...
-
Chapter and Conference Paper
Aggregate operation movement: A min-cut approach to global code motion
This paper describes a novel alternative to trace scheduling and other global scheduling techniques that attempt to boost instruction level parallelism by moving operations beyond basic block boundaries. We qu...
-
Chapter and Conference Paper
COP: A new method for extracting edges and corners
This paper presents a new, simple and effective low level processing method to obtain features such as edges and corners. In both edge and corner extraction algorithms, we use two oriented cross operators call...
-
Chapter and Conference Paper
On the security of some variants of the RSA signature scheme
We describe adaptive attacks on several variants of the RSA signature scheme by de Jonge and Chaum. Moreover, we show how to break Boyd’s scheme with an adaptive, a directed and a known signature attack. The f...
-
Chapter and Conference Paper
Improving the Security of the McEliece Public-Key Cryptosystem
At Crypt’97, Berson showed that the McEliece public-key cryptosystem suffers from two weaknesses: (1) failure to protect any message which is encrypted more than once, (2) failure to protect any messages which...
-
Chapter and Conference Paper
Dense 2D displacement reconstruction from SPAMM-MRI with constrained elastic splines: Implementation and validation
Efficient constrained thin-plate spline warps are proposed in this paper which can warp an area in the plane such that two embedded snake grids obtained from two SPAMM frames are brought into registration, int...
-
Chapter and Conference Paper
Global cache management for multi-class workloads in data warehouses
Data warehouses usually rely on the underlying database management systems, and operations in warehouses require adequate global cache management for both base data and derived sets. However, a problem is how ...
-
Chapter and Conference Paper
Efficient Mining of High Confidence Association Rules without Support Thresholds
Association rules describe the degree of dependence between items in transactional datasets by their confidences. In this paper, we first introduce the problem of mining top rules, namely those association rules ...
-
Chapter and Conference Paper
Scheduling System Verification
A formal framework is proposed for the verification of complex realtime systems, modeled as client-server scheduling systems, using the popular model-checking approach. Model-checking is often restricted by th...
-
Chapter and Conference Paper
On the Design of RSA with Short Secret Exponent
At Eurocrypt’99, Boneh and Durfee presented a new short secret exponent attack which improves Wiener’s bound (d < N 0.25) up to d < N 0.292. In this paper we show that it is possib...
-
Chapter and Conference Paper
A Statistical-Empirical Hybrid Approach to Hierarchical Memory Analysis
A hybrid approach that utilizes both statistical techniques and empirical methods seeks to provide more information about the performance of an application. In this paper, we present a general approach to crea...
-
Chapter and Conference Paper
A Simple and Efficient Approach to Verifying Cryptographic Protocols
It is necessary to development the formal tools for verifying cryptographic protocols because of the subtlety of cryptographic protocols flaws; In terms of the notions of restrictive channel and equivalent mes...
-
Chapter and Conference Paper
A New Approximation Method of the Quadratic Discriminant Function
For many statistical pattern recognition methods, distributions of sample vectors are assumed to be normal, and the quadratic discriminant function derived from the probability density function of multivariate...
-
Chapter and Conference Paper
Fast Implementation of Elliptic Curve Arithmetic in GF(p n )
Elliptic curve cryptosystems have attracted much attention in recent years and one of major interests in ECC is to develop fast algorithms for field/elliptic curve arithmetic. In this paper we present various ...
-
Chapter and Conference Paper
A Simplified Field-of-View Calibration Technique for an Operating Microscope
We present a simplified camera calibration algorithm taking advantage of the geometry of our operating microscope, and requiring no special calibration target. Simulations showed that this algorithm is moderat...
-
Chapter and Conference Paper
A Fuzzy Load Balancing Service for Network Computing Based on **i
Distributed object computing systems are widely envisioned to be the desired distributed software development paradigm due to the higher modularity and the capability of handling machine and operating system h...
-
Chapter and Conference Paper
Technologies for Augmented Reality: Calibration for Real-Time Superimposition on Rigid and Simple-Deformable Real Objects
A current challenge in augmented reality applications is the ability to superimpose synthetic objects on real objects within the environment. This challenge is heightened when the real objects are in motion an...
-
Chapter and Conference Paper
A Quantitative Comparison of Edges in 3D Intraoperative Ultrasound and Preoperative MR Images of the Brain
The displacement of brain tissue during neurosurgery is a significant source of error for image-guidance systems. We are investigating the use of a computational model to predict brain shift and warp preoperat...